TY - GEN
T1 - Ancestor excludable hierarchical ID-based encryption revisited
AU - Zhang, Fan
AU - Guo, Hua
AU - Li, Zhoujun
PY - 2013
Y1 - 2013
N2 - A hierarchical ID-based encryption (HIBE) allows a root Private Key Generator (PKG) to delegate private key generation and identity authentication to lower-level PKGs. However, any ancestor in the path can generate a private key for any descendant node and thus decrypt the ciphertext. In an ancestor-excludable HIBE (AE-HIBE) scheme, ancestors with a level less than the designated one can be excluded from a set of privileged ancestors who have the right to decrypt a ciphertext to a target node. We find that the functional definition and the concrete scheme proposed by Miyaji are flawed. To fix the problem, we introduce a new functional definition of AE-HIBE and present a new AE-HIBE scheme. The new scheme is proved to be ID-CPA secure in the random oracle and can be converted to ID-CCA security by applying a conversional method.
AB - A hierarchical ID-based encryption (HIBE) allows a root Private Key Generator (PKG) to delegate private key generation and identity authentication to lower-level PKGs. However, any ancestor in the path can generate a private key for any descendant node and thus decrypt the ciphertext. In an ancestor-excludable HIBE (AE-HIBE) scheme, ancestors with a level less than the designated one can be excluded from a set of privileged ancestors who have the right to decrypt a ciphertext to a target node. We find that the functional definition and the concrete scheme proposed by Miyaji are flawed. To fix the problem, we introduce a new functional definition of AE-HIBE and present a new AE-HIBE scheme. The new scheme is proved to be ID-CPA secure in the random oracle and can be converted to ID-CCA security by applying a conversional method.
KW - Ancestor Excludable Hierarchical Identity-based Encryption
KW - Identity-based Cryptography
KW - Provable Security
UR - https://www.scopus.com/pages/publications/84883373265
U2 - 10.1007/978-3-642-38631-2_54
DO - 10.1007/978-3-642-38631-2_54
M3 - 会议稿件
AN - SCOPUS:84883373265
SN - 9783642386305
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 663
EP - 670
BT - Network and System Security - 7th International Conference, NSS 2013, Proceedings
T2 - 7th International Conference on Network and System Security, NSS 2013
Y2 - 3 June 2013 through 4 June 2013
ER -